Welcome to the first edition of what is planned to be a regular fortnightly column for SourceSecurity.com, in which I will aim to bring topical and incisive comment to bear on the most critical security issues of the day. In particular, through ‘Notes from Norstrom', I plan to take a timely look at what is grabbing the media headlines, from a crime fighting perspective, going behind the sound-bites to offer, what I hope will be, a considered and thought provoking view on topics from retail security to dealing with the ongoing terrorist threat.

Through this column, I will also seek to place each talking point into context, in terms of the specification and application of the latest CCTV technology, outlining the benefits and the pitfalls to be avoided. With technology changing at an ever increasing pace, through advances such as High Definition CCTV and the adoption of rapidly deployable mobile solutions, I will be taking the opportunity offered by 'Notes from Norstrom' to demystify some of the jargon and concentrate on the practical, on-the-ground, implications of such solutions.

I have always been a strong believer in the pressing need to ensure that CCTV is applied effectively to maximize users' return on their investment - which given the current downturn is more critical than ever - and to counter the CCTV naysayers who are all to ready to highlight bad practice and ignore its proven crime fighting abilities. With this in mind, over the coming weeks and months, I will be giving SourceSecurity.com readers an invaluable insight into CCTV standards and best practice, offering the benefit of my wide ranging experience through the BSIA - from digital video evidence to privacy masking - and as the sole security industry representative responsible for the implementation of National CCTV Strategy in the UK.

Looking ahead, I am keen that 'Notes from Norstrom' becomes very much a two-way process so any suggestions for topics to cover in future columns and/or feedback on specific points will be gratefully received. Comments can be sent to Norstrom@SourceSecurity.com.

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...